In the field of biological weapons, there is almost no prospect of detecting a pathogen until it has been used in an attack.

A national security letter cannot be used to authorize eavesdropping or to read the contents of e-mail. But it does permit investigators to trace revealing paths through the private affairs of a modern digital citizen.

'Social engineering,' the fancy term for tricking you into giving away your digital secrets, is at least as great a threat as spooky technology.

During the morning rush hour on March 20, 1995, the Japanese cult Aum Shinrikyo placed packages on five subway trains converging on Tokyo's central station. When punctured, the packages spread vaporized Sarin through the subway cars and then into the stations as the trains pulled in.

On March 12, 2004, acting attorney general James B. Comey and the Justice Department's top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal.

True net-heads sometimes resort to punctuation cartoons to get around the absence of inflection.

Throughout the early and mid-1990s, the Clinton administration debated the merits of paying for AIDS testing and counseling of vulnerable populations overseas.

The government of Sudan, employing a back channel direct from its president to the Central Intelligence Agency, offered in the early spring of 1996 to arrest Osama bin Laden and place him in Saudi custody, according to officials and former officials in all three countries.

It turns out that American Express honors recurring payments even if the vendor is unable to supply an accurate card number and expiration date. An Amex phone representative said this is a feature, not a bug, which makes sure my bills are paid.

If you do write down your passwords, don't make it obvious which password corresponds to which account. Even better, write the passwords incorrectly and make up an easy rule for fixing them. You could decide to add 1 to each number in your password, so that 2x6Y is written as 3x7Y.

The federal government is often said in militia circles to have made wholesale seizures of power, at times by subterfuge. A leading grievance holds that the 16th Amendment, which authorizes the federal income tax, was ratified through fraud.

The first reports of AIDS closely followed the inauguration of President Ronald Reagan, whose 'family values' agenda and alliance with Christian conservatives associated AIDS with deviance and sin.

Everyone and his Big Brother wants to log your browsing habits, the better to build a profile of who you are and how you live your life - online and off. Search engine companies offer a benefit in return: more relevant search results. The more they know about you, the better they can tailor information to your needs.

There's a long history of private-company cooperation with the NSA that dates back to at least the 1970s.

First developed as a weapon by the U.S. Army, VX is an oily, odorless and tasteless liquid that kills on contact with the skin or when inhaled in aerosol form. Like other nerve agents, it is treatable in the first minutes after exposure but otherwise leads swiftly to fatal convulsions and respiratory failure.

In effect, you cannot stop Iraq from growing nasty bugs in the basement. You can stop them from putting operational warheads on working missiles and launching them at their neighbors.

Why does it appear that interested readers so often attribute flaws to 'the press' rather than taking particular issue with particular reports?